Threat Analysis on Vehicle Computer Systems
Vehicles have been around in our society for over a century, until recently they have been standalone systems. With increased amounts of initiatives to inter-network vehicles to avoid accidents and reduce environmental impact the view of a vehicle as a standalone system needs to be reconsidered. Net...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Linköpings universitet, Institutionen för datavetenskap
2010
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53661 |
id |
ndltd-UPSALLA1-oai-DiVA.org-liu-53661 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-liu-536612018-01-13T05:16:30ZThreat Analysis on Vehicle Computer SystemsengVestlund, ChristianLinköpings universitet, Institutionen för datavetenskap2010Vehicle computer systemthreatthreat analysisfault treeComputer SciencesDatavetenskap (datalogi)Vehicles have been around in our society for over a century, until recently they have been standalone systems. With increased amounts of initiatives to inter-network vehicles to avoid accidents and reduce environmental impact the view of a vehicle as a standalone system needs to be reconsidered. Networking and cooperation between vehicles requires that all systems and the information therein are trustworthy. Faulty or malicious vehicle systems are thus not limited to only affecting a single vehicle but also the entire network. The detection of anomalous behavior in a vehicle computer system is therefore of importance. To improve the vehicle systems we strive to achieve security awareness within the vehicle computer system. As a first step we will identify threats toward the vehicle computer system and what has been done to address them. We perform a threat analysis consisting of fault trees and misuse cases to identify the threats. The fault trees provide away to connect the threats found with vehicle stakeholders' goals. The connection between stakeholder goals and threat highlights the need for threat mitigation. Several research initiatives are discussed to find out what has been done to address the identified threats and to find the state of the research for security in vehicle computer system. Lastly, an error model for the Controller Area Network (CAN) is proposed to model the consequences of threats applied to the CAN bus. Student thesisinfo:eu-repo/semantics/masterThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53661application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
Vehicle computer system threat threat analysis fault tree Computer Sciences Datavetenskap (datalogi) |
spellingShingle |
Vehicle computer system threat threat analysis fault tree Computer Sciences Datavetenskap (datalogi) Vestlund, Christian Threat Analysis on Vehicle Computer Systems |
description |
Vehicles have been around in our society for over a century, until recently they have been standalone systems. With increased amounts of initiatives to inter-network vehicles to avoid accidents and reduce environmental impact the view of a vehicle as a standalone system needs to be reconsidered. Networking and cooperation between vehicles requires that all systems and the information therein are trustworthy. Faulty or malicious vehicle systems are thus not limited to only affecting a single vehicle but also the entire network. The detection of anomalous behavior in a vehicle computer system is therefore of importance. To improve the vehicle systems we strive to achieve security awareness within the vehicle computer system. As a first step we will identify threats toward the vehicle computer system and what has been done to address them. We perform a threat analysis consisting of fault trees and misuse cases to identify the threats. The fault trees provide away to connect the threats found with vehicle stakeholders' goals. The connection between stakeholder goals and threat highlights the need for threat mitigation. Several research initiatives are discussed to find out what has been done to address the identified threats and to find the state of the research for security in vehicle computer system. Lastly, an error model for the Controller Area Network (CAN) is proposed to model the consequences of threats applied to the CAN bus. |
author |
Vestlund, Christian |
author_facet |
Vestlund, Christian |
author_sort |
Vestlund, Christian |
title |
Threat Analysis on Vehicle Computer Systems |
title_short |
Threat Analysis on Vehicle Computer Systems |
title_full |
Threat Analysis on Vehicle Computer Systems |
title_fullStr |
Threat Analysis on Vehicle Computer Systems |
title_full_unstemmed |
Threat Analysis on Vehicle Computer Systems |
title_sort |
threat analysis on vehicle computer systems |
publisher |
Linköpings universitet, Institutionen för datavetenskap |
publishDate |
2010 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53661 |
work_keys_str_mv |
AT vestlundchristian threatanalysisonvehiclecomputersystems |
_version_ |
1718608928618577920 |